You are on page 1of 2

 Understanding the basics of cybersecurity

 Exploring the different types of cyber threats and attack vectors


 Overview of cybersecurity frameworks and best practices
 Roles & responsibilities
 Terminology in SOC

 Securing operating systems (Windows, Linux, macOS)


 User management and access controls
 Patch management and software updates
 Host-based intrusion detection and prevention

 Fundamentals of network architecture and protocols


 Network security devices and technologies (firewalls, IDS/IPS)
 Network monitoring and traffic analysis
 Wireless network security and authentication

 Network vulnerabilities
 Operating system vulnerabilities
 Process (or procedural) vulnerabilities
 Human vulnerabilities.

 Incident Response Techniques

 Basic Concepts of Static Analysis and Dynamic Analysis

 Common web application vulnerabilities (e.g., XSS, SQL Injection)


 Secure coding practices and secure development methodologies
 Injection Attacks. ...
 Broken Authentication. ...
 Cross Site Scripting (XSS) ...

 Identification of Phishing emails

 Real Time Tools & Hands On Practice Labs

You might also like